07:30 |
Registration & Networking Breakfast
|
07:55 |
Early Bird Raffle Draw
|
08:00 |
Digital Trust - CISO’s Route to Digital Transformation
Kayıhan Altınöz
Head of Information Security, ING Bank
Selda Aydoğmuşoğlu
Information Security Manager, Migros
Yaşar Sarcan
CISO, Borusan Holding
Müge Şanoğlu
Regional Information Security Officer, BSH
Mehmet Karabıyık
Head of IT Security & Risk, ICBC Turkey
Mert Çakar
CISO, TurkishBank
|
08:40 |
Business Security: Risk & Resilience
Mark Child
Research Manager, Software, Central & Eastern Europe, IDC CEMA
|
09:00 |
Rebalancing the Golden Triangle
Bülent Okta
Technology Solution & Services Director, KoçSistem
|
09:15 |
Addressing Cyber Security Through Digital Transformation
Özgür Kara
Cyber Security Country Sales Manager, Cisco
|
While rushing for digital transformation, it is possible to ignore deploying cyber security as a core component of the fabric. This presentation focuses on best practices with real world examples on how to conduct transformation without compromising visibility, segmentation and threat protection which are the key components of a secure digital network architecture. |
09:30 |
Using Intelligence to Build a Resilient Organization
Fatma Hacıoğlu Doğar
Cyber Security Services Director, Netaş
|
09:45 |
Networking Break & 1-2-1 Meetings
|
10:15 |
Morning Sessions (Parallel Sessions)
|
Managed Security
10:15 - 10:30
The Cost of Being Risk-Averse
10:30 - 10:40
The Age of Disappearing Boundaries
Savaş Ergen
Infrastructure & Operations Director, CK Enerji
Özben Miçooğulları
Regional Sales Director, TR & ME, Picus Security
10:40 - 10:50
New Base of Cyber Security
Zeynep Erkmen
General Manager, Netsmart
Serdar Yokuş
General Manager, Biznet Bilişim
10:50 - 11:00
Managed Security: From SIEM to SOC
Murat Hüseyin Candan
General Manager, Barikat
11:00 - 11:10
How Cloud Helps Customers Defend Against Today’s Top Security Threats
Pınar Uğurlu Kirazcı
Cloud Customer Engineer, Google Cloud
11:10 - 11:20
The New Border: Identity
İbrahim Güler
Senior IT Security Consultant, Inforte
The New Border: Identity
Users and the privileges which are defined for these users are emerging as the weak link of the world of information technologies. We need as a security Professional, new tools of identity management which is the frontline.
11:20 - 11:30
The Importance of Threat Intelligence in Information Security
11:30 - 11:40
Network Evolution: The Secure Automated Cloud
Artun Kocaman
Senior Systems Engineer, Juniper Networks
11:40 - 11:50
Three Reasons to Consider Managed Security Services
11:50 - 12:40
How to Combat against Modern Security Challenges
Tuğba Öztürk
Information Security Manager, Boyner Grup
Cihan Yüceer
Manager, Cyber Defense Center, Turkcell
Emrah Bayarçelik
Group Manager, IT Infrastructure & Security, IGA
Gamze Yurttutan
Principal, MasterCard
Gökhan Bozdoğan
Technology Security Operations Manager, Vodafone
İbrahim Aslanbakan
Manager, Network & Cyber Security, ASAŞ
Business Risk & Resilience
10:15 - 10:30
Crossbar is Going Up Rapidly
Gülden Yüncüoğlu
CISO, TEB
10:30 - 10:40
Rethinking Data Security - Risk Adaptive Protection
Özgür Danışman
Head of Sales Engineering, Emerging Markets, Forcepoint
10:40 - 10:50
Staying One Step Ahead Of Cyber Attackers with Threat Intel
Mert Sarıca
VP, Cyber Defense Center, Akbank
Ümit Nadim
Country Manager, FireEye
10:50 - 11:00
How to Predict Data Breaches Using Machine Learning & Big Data
Ayşin Gök
Country Manager, NormShield
11:00 - 11:10
Privilege First
Nurdoğan Çıkı
Cyber Security Team Leader, THY
Esra Çalışkan
Regional Sales Manager, CyberArk
11:10 - 11:20
How To Train Your Dragon
Kürşad Sezgin
Sales Manager, Barracuda
How To Train Your Dragon
Your corporate IT security is a dragon. You can train it, or it can train you instead. In today's demanding security environment and risks, the IT security spendings are on the rise. How are you going to train your dragon?
11:20 - 11:30
Social Hacking
Gabe Goldhirsh
Vice President, MEA/APAC, Zerofox
11:30 - 11:40
Rethinking Data Security
Eren Sönmez
Principal Presales Consultant, Symantec Turkey
11:40 - 11:50
Enterprise Security with Cyber Intelligence
Caner Dağlı
Technical Manager, Nebula
11:50 - 12:40
New Age of Cyber Threaths
Alpaslan Binici
IT Security Manager, Şekerbank
Aytekin Güzeliş
CISO, AvivaSA Emeklilik ve Hayat
Bektaş Özkan
Operations Director, Sabancı
Hakan Tokay
Security Operation Manager, Turkcell
Sibel Merey
IT Security, Risk and Compliance Manager, Şişecam
Hakan Tercan
Unit Manager, Information Security, Halkbank
Trends & Capabilities
10:15 - 10:30
What is Container Security?
Alper Ümit Yılmaz
IT Service & System Operations Director, n11.com
10:30 - 10:40
Machine Learning & AI in Cyber Security
Furkan Batman
Cyber Security Team Leader, Platin Bilişim
10:40 - 10:50
Swarm Intelligence in Cyber Security
Melih Kırkgöz
“Office of the CTO” Member, Regional Technology Director, Fortinet
10:50 - 11:00
Cyber Security Meets Data Security
Levent Ortaköylüoğlu
Executive Partner, Natica
Selim Öziş
Security Architect, Natica
11:00 - 11:10
Cyber Deception Solutions for Early Internal Threat Detection & Incident Response
11:10 - 11:20
Changing the Paradigm Using Deception
Doron Kolton
Chief Strategy Officer, Emerging Technologies, Fidelis Security
Changing the Paradigm Using Deception
Current prevention solutions do not provide 100% prevention capabilities. On the other hand, detection solutions trigger too many events and false positives which the security team can’t manage. This presentation focuses on Deception as an accurate solution to detect infected assets inside the organization while reducing the overhead on the security team and proactively gathering information about the attackers.
The presentation will:
- describe the challenges of building and deploying deception solutions
- present the components included in a modern deception solution
- recommend optional architecture for deploying deception solutions
- how deception can be integrated with the security eco-system
11:20 - 11:30
Real Practices in OT Security
Alper Şulan
Coordinator, IT Risk and Compliance, TÜPRAŞ
11:30 - 11:40
How to Prepare Security Landscape for Cloud?
11:40 - 11:50
New Era: Application Security Testing Orchestration (ASTO)
Cenk Kalpakoğlu
CTO, EndPoint Labs
11:50 - 12:40
The War in Automation Security: IT vs OT
Savaş Ergen
Infrastructure & Operations Director, CK Enerji
Pelin Pehlivan
Group Manager, Information Security, Risk and Compliance, Enerjisa
Mehmet Karadeniz
CIO, ADM Elektrik Dağıtım
Murat Yılmaz
Technology Projects Consultant, Meram EDAŞ
Ezgi Ceylan
Account Manager, Barikat
|
12:40 |
Networking Lunch & Roundtables
|
14:00 |
Running The Business of Security
Elif Uslu
Head of Security & Business Continuity, BNP Paribas Cardif
Akif Mert Avcı
Manager, Information Security, IT Process and Compliance, Vakıfbank
Ümit Malkoç
Unit Manager, Information Security, IT Risk & Business Continuity, Garanti Bankası
Özer Gülce
Manager, Information Security, & Governance, Alternatif Bank
Barış Dönmez
Senior Manager, Security Governance & Capabilities, Turkcell
Dr. Burak Uluocak
Head of Enterprise Agile Project Delivery & Governance, Türkiye Finans
|
15:00 |
Afternoon Sessions - Technical Insights (Parallel Sessions)
|
Track 1: Managed Security
15:00 - 15:20
Overcoming Security Objections and Making Security A Differentiator
Muharrem Erdoğdu
Customer Engineer, Google Cloud
15:20 - 15:40
Case Study: IGA Offensive Security
Emrah Bayarçelik
Group Manager, IT Infrastructure & Security, IGA
Ramazan Çelik
Deputy General Manager, Barikat
15:40 - 16:00
SOC Operations to Bolster Cyber Security Capabilities
Track 2: Endpoint Protection
15:00 - 15:20
Defining Endpoint Protection in Digitally Disrupted Times
Erhan Anuk
Enterprise Account Manager, Symantec
15:20 - 15:40
A New Era of Cyber Threats: The Shift to Self Learning, Self Defending Networks
Elizabeth de Freitas
Regional Manager, Darktrace
15:40 - 16:00
Security Awareness: Users are the Weakest Link
Bülent Muşlu
SVP, Information Security, IT Compliance and Service Management, Bankalararası Kart Merkezi
Track 3: Analytics, AI, ML
15:00 - 15:20
AI-powered Integration, Automation and Cyber Threat Response
Melih Kırkgöz
“Office of the CTO” Member, Regional Technology Director, Fortinet
15:20 - 15:40
Deception Technologies: Defined, Explained, and Explored
15:40 - 16:00
How to Strengthen Application Security with Limited Budget?
Track 4: Identity & Trust
15:00 - 15:20
Defending against Privileged Account Attacks
Serhat Erkan
Senior Sales Engineer, CyberArk
15:20 - 15:40
The New Border: Identity
İbrahim Güler
Senior IT Security Consultant, Inforte
The New Border: Identity
Users and the privileges which are defined for these users are emerging as the weak link of the world of information technologies. We need as a security Professional, new tools of identity management which is the frontline.
15:40 - 16:00
Kron Case Study: Identity for an Open Perimeter
Ömer Çuhadaroğlu
Expert Enterprise Security Architect, Turkcell
Track 5: Threat Intelligence & Response
15:00 - 15:20
Your Security from-East-to-west
Gürsel Arıcı
Presales Manager, Picus Security
15:20 - 15:40
Adaptive Cyber Deception for Early & Accurate Threat Detection & Response
Bahi Hour
SE Director, META, Attivo Networks
15:40 - 16:00
Making Threat Hunting a Reality
Ahmed Ali
Lead Systems Engineer META, Fidelis Security
Track 6: Data Security & Risk Management
15:00 - 15:20
Protect the People and Critical Data Everywhere Through a Human-centric Approach
Murat Bayraktar
Sales Engineering Manager, Forcepoint
15:20 - 15:40
Managing Third Party Cyber Risk Using Security Ratings
Ferhat Dikbıyık
R&D Manager, NormShield
Ayşin Gök
Country Manager, NormShield
15:40 - 16:00
Social Hacking & Risk Management
Gabe Goldhirsh
Vice President, MEA/APAC, Zerofox
Social Hacking & Risk Management
Track 7: Data & Cloud Security
15:00 - 15:20
Container Networking and Security
Ayhan Çelik
Senior System Engineer, Networking & Security, VMware
15:20 - 15:40
Let’s Train Your Dragon
Feyza Kavala
System Engineer, Barracuda
Let’s Train Your Dragon
Your corporate IT security is a dragon. In order to protect your data and your business, you must train your dragon against today's risks. In distributed and hybrid systems how you will build security , how you will drive your dragon to attack and defense?
15:40 - 16:00
Building Security in Cloud
Track 8: KVKK / OT Security
15:00 - 15:20
How to Be Compliant with KVKK
Şerif Özdede
IT Risk & Compliance Specialist, Nebula
15:20 - 15:40
OT Security Outcomes in Energy Industry
Sunay Musaoğlu
Senior Solution Manager, KoçSistem
15:40 - 16:00
Penetration Tests for ICS & SCADA Systems
Doç. Dr. Bilgin Metin
Faculty Member, MIS, Bogazici University
|
16:00 |
Startup Session
|
16:30 |
Raffle Draw
|